
Concept explainers
- Authorization of transactions is a key control in most organizations. Authorizations
should not be made by individuals who have incompatible functions. For each
transaction (listed as A through I), indicate the individual or function (e.g., the head of a
particular department) that should have the ability to authorize that transaction.
Briefly provide a rationale for your answer.
- Writing off old
accounts receivable . - Committing the organization to acquire another company that is half the size of the
existing company.
- Paying an employee for overtime.
- Shipping goods on account to a new customer.
Individual(Salesperson)- The salesperson may ship the goods which can be supervised by a senior.
- Purchasing goods from a new vendor.
Individual- The purchase manager is responsible for acquiring goods from new vendors
- Temporarily investing funds in common stock investments instead of
money market
Funds. CEO
- Purchasing a new line of manufacturing equipment to remodel a production line at
one of the company’s major divisions (the purchase represents a major new
investment for the organization).
- Replacing an older machine at one of the company’s major divisions.
- Rewriting the company’s major computer program for processing purchase orders
and accounts payable (the cost of rewriting the program will represent one quarter
of the organization’s computer development budget for the year).

Trending nowThis is a popular solution!
Step by stepSolved in 2 steps

- Controls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…arrow_forward3. Which of the following is not a computer facility control? (a) Place the data processing center where unauthorized individuals cannot gain entry to the facility. (b) Limit access to the data processing center all employees of the company. (c) Buy insurance to protect against loss of equipment in the computer facility. (d) Use advanced technology to identify individuals who are authorized access to the data processing center. 4.For internal control over computer program changes, a policy should be established requiring that: (a) All proposed changes be approved by a responsible individual and logged. (b) The programmer designing the change should be responsible for ensuring that the revised program is adequately tested. (c) All program changes be supervised by the information system control group. (d) To facilitate operational performance, superseded portions of programs should not be deleted from the program run manual. 5. Auditing "around the computer": (a) Assumes that accurate…arrow_forwardYou are an audit supervisor assigned to a new client which is listed on a Stock Exchange. You visited the corporate headquarters to become acquainted with key personnel and to conduct a preliminary review of the company’s accounting policies, controls, and systems. During this visit, (h) Some employees complained that some managers occasionally contradict the instructions of other managers regarding proper data security procedures. Identify the problems and explain them in relation to the internal environment.arrow_forward
- Allowing only certain employees to order goods and services for the company is an example of what internal control procedure? a.Proper authorization b.Independent verification c.Segregation of duties d.Safeguarding of assets and recordsarrow_forwardWhich is correct ?arrow_forward5. A company encourages employees to call an anonymous hotline if they believe other employees are circumventing internal control features. Is this related to control activities of a company?arrow_forward
- AccountingAccountingISBN:9781337272094Author:WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.Publisher:Cengage Learning,Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
- Horngren's Cost Accounting: A Managerial Emphasis...AccountingISBN:9780134475585Author:Srikant M. Datar, Madhav V. RajanPublisher:PEARSONIntermediate AccountingAccountingISBN:9781259722660Author:J. David Spiceland, Mark W. Nelson, Wayne M ThomasPublisher:McGraw-Hill EducationFinancial and Managerial AccountingAccountingISBN:9781259726705Author:John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting PrinciplesPublisher:McGraw-Hill Education





